Genel, Güvenlik
Fortigate Multiple İnterfaces Policies Nedir ?

Fortigate Multiple İnterfaces Policies Nedir ?

Herkese Merhaba,

Fortigate’ in Multiple İnterfaces Policies özelliğinden bahsedeceğiz. Ne işimize yarar diye düşünürsek normalde source ve destination interface eklediğimiz kuralları düşünün ve onu sources ve destinations olarak değiştirelim kısaca kural kalabalığından kurtarıyor diyebiliriz.

Dezavantaj olarak ise (makalenin sonunda farkı göstereceğim) kural ekranımızdaki default ta gelen INTERFACE PAIR görünümünü kapatıyor ve BY SEQUENCE moduna geçiyor. Çünkü kuralımız tek bir interface olmayacağı için bu ayarlama yapılamıyor.

Örnek olarak bir yere VPN vermek istiyorsunuz. Port1 ve Port2 interfaceleri ayrı networkler olduğunu düşünelim. Bunun için VPN to Port1 ve VPN to Port2 diye 2 ayrı kural yapmam lazım. Bu anlatacağım özellik sayesinde tek kural ile VPN to Port1 and Port2 yapabiliyor olacağım ve tek kural da işimi çözmüş olacağım .

Nasıl yapıldığına geçelim;

İlk olarak System > Feature Select sayfasına gelip MULTIPLE INTERFACE POLICIES özelliğini aktif ediyoruz.

Bunu yaptıktan sonra yeni bir kural oluşturuyoruz.

Gördüğünüz gibi birden fazla source ve destination interface e sahip bir kural oluşturduk ok diyerek kaydediyoruz.

Ve gördüğünüz gibi kuralımız belirlediğimiz portlarla oluştu.

İşinize Yaraması Dileğiyle..

BY SEQUENCE görünümü

INTERFACE PAIR görünümü

Share this Story

Related Posts

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

The Hacker News

  • SolarWinds Hackers Also Breached Malwarebytes Cybersecurity Firm
    by [email protected] (Ravie Lakshmanan) on 20 Ocak 2021 at 11:27

    Malwarebytes on Tuesday said it was breached by the same group who broke into SolarWinds to access some of its internal emails, making it the fourth major cybersecurity vendor to be targeted after FireEye, Microsoft, and CrowdStrike. The company said its intrusion was not the result of a SolarWinds compromise, but rather due to a separate initial access vector that works by "abusing applications […]

  • Google Discloses Flaws in Signal, FB Messenger, JioChat Messaging Apps
    by [email protected] (Ravie Lakshmanan) on 20 Ocak 2021 at 11:16

    In January 2019, a critical flaw was reported in Apple's FaceTime group chats feature that made it possible for users to initiate a FaceTime video call and eavesdrop on targets by adding their own number as a third person in a group chat even before the person on the other end accepted the incoming call. The vulnerability was deemed so severe that the iPhone maker removed the FaceTime grou […]

  • Researchers Discover Raindrop — 4th Malware Linked to the SolarWinds Attack
    by [email protected] (Ravie Lakshmanan) on 19 Ocak 2021 at 15:04

    Cybersecurity researchers have unearthed a fourth new malware strain—designed to spread the malware onto other computers in victims' networks—which was deployed as part of the SolarWinds supply chain attack disclosed late last year. Dubbed "Raindrop" by Broadcom-owned Symantec, the malware joins the likes of other malicious implants such as Sunspot, Sunburst (or Solorigate), and Teardrop that […]

  • A Set of Severe Flaws Affect Popular DNSMasq DNS Forwarder
    by [email protected] (Ravie Lakshmanan) on 19 Ocak 2021 at 13:43

    Cybersecurity researchers have uncovered multiple vulnerabilities in Dnsmasq, a popular open-source software used for caching Domain Name System (DNS) responses, thereby potentially allowing an adversary to mount DNS cache poisoning attacks and remotely execute malicious code. The seven flaws, collectively called "DNSpooq" by Israeli research firm JSOF, echoes previously disclosed weaknesses in […]

  • FreakOut! Ongoing Botnet Attack Exploiting Recent Linux Vulnerabilities
    by [email protected] (Ravie Lakshmanan) on 19 Ocak 2021 at 13:40

    An ongoing malware campaign has been found exploiting recently disclosed vulnerabilities in network-attached storage (NAS) devices running on Linux systems to co-opt the machines into an IRC botnet for launching distributed denial-of-service (DDoS) attacks and mining Monero cryptocurrency. The attacks deploy a new  malware variant called "FreakOut" by leveraging critical flaws fixed in Laminas […]